100-105 Premium Bundle

100-105 Premium Bundle

Cisco Interconnecting Cisco Networking Devices Part 1 (ICND1 v3.0) Certification Exam

4.5 
(35220 ratings)
0 QuestionsPractice Tests
0 PDFPrint version
April 20, 2024Last update

Cisco 100-105 Free Practice Questions

Q1. - (Topic 3) 

Which one of the following IP addresses is the last valid host in the subnet using mask 255.255.255.224? 

A. 192.168.2.63 

B. 192.168.2.62 

C. 192.168.2.61 

D. 192.168.2.60 

E. 192.168.2.32 

Answer:

Explanation: 

With the 224 there are 8 networks with increments of 32 One of these is 32 33 62 63 where 63 is broadcast so 62 is last valid host out of given choices. 

Q2. - (Topic 3) 

Which statement about IPv6 is true? 

A. Addresses are not hierarchical and are assigned at random. 

B. Only one IPv6 address can exist on a given interface. 

C. There are 2.7 billion addresses available. 

D. Broadcasts have been eliminated and replaced with multicasts. 

Answer:

Explanation: 

IPv6 has three types of addresses, which can be categorized by type and scope: 

Unicast addresses. A packet is delivered to one interface. 

Multicast addresses. A packet is delivered to multiple interfaces. 

Anycast addresses. A packet is delivered to the nearest of multiple interfaces (in terms of 

routing distance). 

IPv6 does not use broadcast messages. 

Unicast and anycast addresses in IPv6 have the following scopes (for multicast addresses, 

the scope are built into the address structure): 

Link-local. The scope is the local link (nodes on the same subnet). 

Site-local. The scope is the organization (private site addressing). 

Global. The scope is global (IPv6 Internet addresses). 

In addition, IPv6 has special addresses such as the loopback address. The scope of a 

special address depends on the type of special address. 

Much of the IPv6 address space is unassigned. 

http://technet.microsoft.com/en-us/library/cc757359(v=ws.10).aspx 

Q3. - (Topic 3) 

Which command is used to display the collection of OSPF link states? 

A. show ip ospf link-state 

B. show ip ospf lsa database 

C. show ip ospf neighbors 

D. show ip ospf database 

Answer:

Explanation: 

The “show ip ospf database” command displays the link states. Here is an example: 

Here is the lsa database on R2. 

R2#show ip ospf database 

OSPF Router with ID (2.2.2.2) (Process ID 1) 

Router Link States (Area 0) 

Link ID ADV Router Age Seq# Checksum Link count 

2.2.2.2 2.2.2.2 793 0x80000003 0x004F85 2 

10.4.4.4 10.4.4.4 776 0x80000004 0x005643 1 

111.111.111.111 111.111.111.111 755 0x80000005 0x0059CA 2 

133.133.133.133 133.133.133.133 775 0x80000005 0x00B5B1 2 Net Link States (Area 0) Link ID ADV Router Age Seq# Checksum10.1.1.1 111.111.111.111 794 0x80000001 0x001E8B 

10.2.2.3 133.133.133.133 812 0x80000001 0x004BA9 

10.4.4.1 111.111.111.111 755 0x80000001 0x007F16 

10.4.4.3 133.133.133.133 775 0x80000001 0x00C31F 

Q4. - (Topic 3) 

What information can be used by a router running a link-state protocol to build and maintain its topological database? (Choose two.) 

A. hello packets 

B. SAP messages sent by other routers 

C. LSAs from other routers 

D. beacons received on point-to-point links 

E. routing tables received from other link-state routers 

F. TTL packets from designated routers 

Answer: A,C 

Explanation: 

Reference 1: http://www.ciscopress.com/articles/article.asp?p=24090&seqNum=4 

Link state protocols, sometimes called shortest path first or distributed database protocols, are built around a well-known algorithm from graph theory, E. W. Dijkstra'a shortest path algorithm. Examples of link state routing protocols are: Open Shortest Path First (OSPF) for IP The ISO's Intermediate System to Intermediate System (IS-IS) for CLNS and IP DEC's DNA Phase V Novell's NetWare Link Services Protocol (NLSP) Although link state protocols are rightly considered more complex than distance vector protocols, the basic functionality is not complex at all: 

1.

 Each router establishes a relationship—an adjacency—with each of its neighbors. 

2.

 Each router sends link state advertisements (LSAs), some 

3.

 Each router stores a copy of all the LSAs it has seen in a database. If all works well, the databases in all routers should be identical. 

4.

 The completed topological database, also called the link state database, describes a graph of the internetwork. Using the Dijkstra algorithm, each router calculates the shortest path to each network and enters this information into the route table. OSPF Tutorial 

Q5. - (Topic 5) 

Refer to the exhibit. 

The network administrator is testing connectivity from the branch router to the newly installed application server. What is the most likely reason for the first ping having a success rate of only 60 percent? 

A. The network is likely to be congested, with the result that packets are being intermittently dropped. 

B. The branch router had to resolve the application server MAC address. 

C. There is a short delay while NAT translates the server IP address. 

D. A routing table lookup delayed forwarding on the first two ping packets. 

E. The branch router LAN interface should be upgraded to FastEthernet. 

Answer:

Explanation: 

Initially the MAC address had to be resolved, but once it is resolved and is in the ARP table of the router, pings go through immediately. 

Q6. - (Topic 3) 

If an Ethernet port on a router was assigned an IP address of 172.16.112.1/20, what is the maximum number of hosts allowed on this subnet? 

A. 1024 

B. 2046 

C. 4094 

D. 4096 

E. 8190 

Answer:

Explanation: 

Each octet represents eight bits. The bits, in turn, represent (from left to right): 128, 64, 32 , 16 , 8, 4, 2, 1 Add them up and you get 255. Add one for the all zeros option, and the total is 256. Now, take away one of these for the network address (all zeros) and another for the broadcast address (all ones). Each octet represents 254 possible hosts. Or 254 possible networks. Unless you have subnet zero set on your network gear, in which case you could conceivably have 255. The CIDR addressing format (/20) tells us that 20 bits are used for the network portion, so the maximum number of networks are 2^20 minus one if you have subnet zero enabled, or minus 2 if not. You asked about the number of hosts. That will be 32 minus the number of network bits, minus two. So calculate it as (2^(32-20))-2, or (2^12)-2 = 4094 

Q7. - (Topic 5) 

Refer to the exhibit. 

Why was this message received? 

A. No VTY password has been set. 

B. No enable password has been set. 

C. No console password has been set. 

D. No enable secret password has been set. 

E. The login command has not been set on CON 0 

F. The login command has not been set on the VTY ports. 

Answer:

Explanation: 

Your CCNA certification exam is likely going to contain questions about Telnet, an application-level protocol that allows remote communication between two networking devices. With Telnet use being as common as it is, you had better know the details of how to configure it in order to pass your CCNA exam and to work in real-world networks. 

The basic concept is pretty simple - we want to configure R1, but we're at R2. If we telnet successfully to R1, we will be able to configure R1 if we've been given the proper permission levels. In this CCNA case study, R2 has an IP address of 172.12.123.2 and R1 an address of 172.12.123.1. Let's try to telnet from R2 to R1. 

R2#telnet 172.12.123.1 Trying 172.12.123.1 ... Open Password required, but none set [Connection to 172.12.123.1 closed by foreign host] 

This seems like a problem, but it's a problem we're happy to have. A Cisco router will not let any user telnet to it by default. That's a good thing, because we don't want just anyone connecting to our router! The "password required" message means that no password has been set on the VTY lines on R1. Let's do so now. 

R1(config)#line vty 0 4 

R1(config-line)#password baseball 

A password of "baseball" has been set on the VTY lines, so we shouldn't have any trouble using Telnet to get from R2 to R1. Let's try that now. 

R2#telnet 172.12.123.1 

Trying 172.12.123.1 ... Open 

User Access Verification 

Password: 

R1> 

We're in, and placed into user exec mode. 

Reference: 

http://www.mcmcse.com/cisco/guides/telnet_passwords_and_privilege_levels.shtml 

Q8. - (Topic 5) 

The following commands are entered on the router: 

Burbank(config)# enable secret fortress 

Burbank(config)# line con 0 

Burbank(config-line)# login 

Burbank(config-line)# password n0way1n 

Burbank(config-line)# exit 

Burbank(config)# service password-encryption 

What is the purpose of the last command entered? 

A. to require the user to enter an encrypted password during the login process 

B. to prevent the vty, console, and enable passwords from being displayed in plain text in the configuration files 

C. to encrypt the enable secret password 

D. to provide login encryption services between hosts attached to the router 

Answer:

Explanation: 

Certain types of passwords, such as Line passwords, by default appear in clear text in the configuration file. You can use the service password-encryption command to make them more secure. Once this command is entered, each password configured is automatically encrypted and thus rendered illegible inside the configuration file (much as the Enable/Enable Secret passwords are). Securing Line passwords is doubly important in networks on which TFTP servers are used, because TFTP backup entails routinely moving config files across networks—and config files, of course, contain Line passwords. 

Q9. - (Topic 2) 

Refer to the exhibit. 

How many collision domains are shown? 

A. one 

B. two 

C. three 

D. four 

E. six 

F. twelve 

Answer:

Explanation: 

Hubs create single collision and broadcast domains, so in this case there will be a single collision domain for each of the two hubs. 

Q10. - (Topic 3) 

Refer to the exhibit. 

PC1 pings PC2. What three things will CORE router do with the data that is received from PC1? (Choose three.) 

A. The data frames will be forwarded out interface FastEthernet0/1 of CORE router. 

B. The data frames will be forwarded out interface FastEthernet1/0 of CORE router. 

C. CORE router will replace the destination IP address of the packets with the IP address of PC2. 

D. CORE router will replace the MAC address of PC2 in the destination MAC address of the frames. 

E. CORE router will put the IP address of the forwarding FastEthernet interface in the place of the source IP address in the packets. 

F. CORE router will put the MAC address of the forwarding FastEthernet interface in the place of the source MAC address. 

Answer: B,D,F 

Explanation: 

The router will forward the frames out the interface toward the destination – B is correct. Since the router will has the end station already in it’s MAC table as see by the “show arp” command, it will replace the destination MAC address to that of PC2 – D is correct. The router will then replace the source IP address to 172.16.40.1 – E is correct. 

Q11. - (Topic 7) 

Which route source code represents the routing protocol with a default administrative distance of 90 in the routing table? 

A. S 

B. E 

C. D 

D. R 

E. O 

Answer:

Explanation: 

SStatic EEGP DEIGRP RRIP OOSPF 

Default Administrative distance of EIGRP protocol is 90 then answer is C 

Default Distance Value TableThis table lists the administrative distance default values of the protocols that Cisco supports: 

Route Source Default Distance Values 

Connected interface 0 Static route 1 Enhanced Interior Gateway Routing Protocol (EIGRP) summary route 5 External Border Gateway Protocol (BGP) 20 Internal EIGRP 90 IGRP 100 OSPF 110 Intermediate System-to-Intermediate System (IS-IS) 115 Routing Information Protocol (RIP) 120 Exterior Gateway Protocol (EGP) 140 On Demand Routing (ODR) 160 External EIGRP 170 Internal BGP 200 Unknown* 255 

Q12. - (Topic 3) 

What is the default administrative distance of OSPF? 

A. 90 

B. 100 

C. 110 

D. 120 

Answer:

Explanation: 

Administrative distance is the feature that routers use in order to select the best path when there are two or more different routes to the same destination from two different routing protocols. Administrative distance defines the reliability of a routing protocol. Each routing protocol is prioritized in order of most to least reliable (believable) with the help of an administrative distance value. 

Default Distance Value Table 

This table lists the administrative distance default values of the protocols that Cisco supports: 

Q13. - (Topic 5) 

Refer to the exhibit. 

Host A can communicate with Host B but not with Hosts C or D. How can the network administrator solve this problem? 

A. Configure Hosts C and D with IP addresses in the 192.168.2.0 network. 

B. Install a router and configure a route to route between VLANs 2 and 3. 

C. Install a second switch and put Hosts C and D on that switch while Hosts A and B remain on the original switch. 

D. Enable the VLAN trunking protocol on the switch. 

Answer:

Explanation: 

Two VLANs require a router in between otherwise they cannot communicate. Different VLANs and different IP subnets need a router to route between them. 

Q14. - (Topic 3) 

Which two statements describe the IP address 10.16.3.65/23? (Choose two.) 

A. The subnet address is 10.16.3.0 255.255.254.0. 

B. The lowest host address in the subnet is 10.16.2.1 255.255.254.0. 

C. The last valid host address in the subnet is 10.16.2.254 255.255.254.0 

D. The broadcast address of the subnet is 10.16.3.255 255.255.254.0. 

E. The network is not subnetted. 

Answer: B,D 

Explanation: 

The mask 255.255.254.0 (/23) used with a Class A address means that there are 15 subnet bits and 9 host bits. The block size in the third octet is 2 (256 - 254). So this makes the subnets in 0, 2, 4, 6, etc., all the way to 254. The host 10.16.3.65 is in the 2.0 subnet. The next subnet is 4.0, so the broadcast address for the 2.0 subnet is 3.255. The valid host addresses are 2.1 through 3.254 

Q15. - (Topic 7) 

Which statement about unicast frame forwarding on a switch is true? 

A. The TCAM table stores destination MAC addresses 

B. If the destination MAC address is unknown, the frame is flooded to every port that is configured in the same VLAN except on the port that it was received on. 

C. The CAM table is used to determine whether traffic is permitted or denied on a switch 

D. The source address is used to determine the switch port to which a frame is forwarded 

Answer:

START 100-105 EXAM